If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Microsoft's IT department is well aware of the hassle involved in patching the company's systems every time a Windows vulnerability is discovered. In the same way customers are forced to patch their systems, Microsoft's IT department deploys Windows updates as often as they're issued. Because of the testing involved, it can take up to 72 hours to roll out a patch across the company. Markezich says his organization doesn't get any head starts; Microsoft's IT department gets Windows fixes at the same time you do.

The diligence to patching has paid off. The last time Microsoft's internal computer systems got nailed by a companywide virus was the Slammer attack in January 2003. Since then, Blaster, MyDoom, and Sasser have been non-events, at least internally.

If Microsoft's own experience is a guide, it's possible to create a secure, full-featured, global Windows environment on a lower-than-average IT budget. That would suggest Markezich just stepped into one of the easiest of CIO jobs. Or one of the toughest.

N00b> STFU i r teh 1337 (english: You must be mistaken, good sir or madam. I believe myself to be quite a good player. On an unrelated matter, I also apparently enjoy math.)

heh i was lucky to open that site before the deface. after a refresh it looked like Owned by OutLaw Group and after a few minutes site was closed. i saved that web into my comp.
Owned OutLaw Group by Pharoeste e Wolfblack.htm
i'm uploading those files into server so if you want you can see it at www.demkat.net/ard/microsoft/
i hope you like that